GB2452879A - Method and system for verification of personnal imformation - Google Patents
Method and system for verification of personnal imformation Download PDFInfo
- Publication number
- GB2452879A GB2452879A GB0821883A GB0821883A GB2452879A GB 2452879 A GB2452879 A GB 2452879A GB 0821883 A GB0821883 A GB 0821883A GB 0821883 A GB0821883 A GB 0821883A GB 2452879 A GB2452879 A GB 2452879A
- Authority
- GB
- United Kingdom
- Prior art keywords
- personnal
- imformation
- verification
- credential information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title 1
- 238000012795 verification Methods 0.000 title 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- H04L29/06639—
-
- H04L29/06721—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H04L9/3202—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Marketing (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
In one form, there is disclosed a system (100) for storing, validating and disseminating credential information about an entity. The system (100) generates data representing at least part of the credential information and a data representation of at least part of a document supporting that information and stores the credential information and data representation in a database (120) in an encrypted form.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2006100468A AU2006100468B4 (en) | 2006-05-31 | 2006-05-31 | Poims |
AU2006202519A AU2006202519A1 (en) | 2006-05-31 | 2006-06-13 | Poims |
PCT/AU2007/000770 WO2007137368A1 (en) | 2006-05-31 | 2007-05-31 | Method and system for verification of personal information |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0821883D0 GB0821883D0 (en) | 2009-01-07 |
GB2452879A true GB2452879A (en) | 2009-03-18 |
Family
ID=38778028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0821883A Withdrawn GB2452879A (en) | 2006-05-31 | 2007-05-31 | Method and system for verification of personnal imformation |
Country Status (4)
Country | Link |
---|---|
US (1) | US20090271321A1 (en) |
AU (2) | AU2006202519A1 (en) |
GB (1) | GB2452879A (en) |
WO (1) | WO2007137368A1 (en) |
Families Citing this family (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9943660B2 (en) | 2006-08-04 | 2018-04-17 | Resmed Limited | Nasal prongs for mask system |
US8989705B1 (en) | 2009-06-18 | 2015-03-24 | Sprint Communications Company L.P. | Secure placement of centralized media controller application in mobile access terminal |
DE102012206202A1 (en) * | 2012-04-16 | 2013-10-17 | Siemens Aktiengesellschaft | Device for digitizing documents and methods |
US9027102B2 (en) | 2012-05-11 | 2015-05-05 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
US9066230B1 (en) | 2012-06-27 | 2015-06-23 | Sprint Communications Company L.P. | Trusted policy and charging enforcement function |
US8649770B1 (en) | 2012-07-02 | 2014-02-11 | Sprint Communications Company, L.P. | Extended trusted security zone radio modem |
US8667607B2 (en) | 2012-07-24 | 2014-03-04 | Sprint Communications Company L.P. | Trusted security zone access to peripheral devices |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US9215180B1 (en) | 2012-08-25 | 2015-12-15 | Sprint Communications Company L.P. | File retrieval in real-time brokering of digital content |
US8954588B1 (en) | 2012-08-25 | 2015-02-10 | Sprint Communications Company L.P. | Reservations in real-time brokering of digital content delivery |
US9015068B1 (en) | 2012-08-25 | 2015-04-21 | Sprint Communications Company L.P. | Framework for real-time brokering of digital content delivery |
US9161227B1 (en) | 2013-02-07 | 2015-10-13 | Sprint Communications Company L.P. | Trusted signaling in long term evolution (LTE) 4G wireless communication |
US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
US9104840B1 (en) | 2013-03-05 | 2015-08-11 | Sprint Communications Company L.P. | Trusted security zone watermark |
US9613208B1 (en) | 2013-03-13 | 2017-04-04 | Sprint Communications Company L.P. | Trusted security zone enhanced with trusted hardware drivers |
US9049186B1 (en) * | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone re-provisioning and re-use capability for refurbished mobile devices |
US9049013B2 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone containers for the protection and confidentiality of trusted service manager data |
US9021585B1 (en) | 2013-03-15 | 2015-04-28 | Sprint Communications Company L.P. | JTAG fuse vulnerability determination and protection using a trusted execution environment |
US9191388B1 (en) | 2013-03-15 | 2015-11-17 | Sprint Communications Company L.P. | Trusted security zone communication addressing on an electronic device |
US9374363B1 (en) | 2013-03-15 | 2016-06-21 | Sprint Communications Company L.P. | Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device |
US8984592B1 (en) | 2013-03-15 | 2015-03-17 | Sprint Communications Company L.P. | Enablement of a trusted security zone authentication for remote mobile device management systems and methods |
US9324016B1 (en) | 2013-04-04 | 2016-04-26 | Sprint Communications Company L.P. | Digest of biographical information for an electronic device with static and dynamic portions |
US9171243B1 (en) | 2013-04-04 | 2015-10-27 | Sprint Communications Company L.P. | System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device |
US9454723B1 (en) | 2013-04-04 | 2016-09-27 | Sprint Communications Company L.P. | Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device |
US9838869B1 (en) | 2013-04-10 | 2017-12-05 | Sprint Communications Company L.P. | Delivering digital content to a mobile device via a digital rights clearing house |
US9443088B1 (en) | 2013-04-15 | 2016-09-13 | Sprint Communications Company L.P. | Protection for multimedia files pre-downloaded to a mobile device |
US9069952B1 (en) | 2013-05-20 | 2015-06-30 | Sprint Communications Company L.P. | Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory |
US20140351907A1 (en) * | 2013-05-21 | 2014-11-27 | Personal Credentialing Group, LLC | Credential authentication system and methods of performing the same |
US9560519B1 (en) | 2013-06-06 | 2017-01-31 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
US9183606B1 (en) | 2013-07-10 | 2015-11-10 | Sprint Communications Company L.P. | Trusted processing location within a graphics processing unit |
US9208339B1 (en) | 2013-08-12 | 2015-12-08 | Sprint Communications Company L.P. | Verifying Applications in Virtual Environments Using a Trusted Security Zone |
US9185626B1 (en) | 2013-10-29 | 2015-11-10 | Sprint Communications Company L.P. | Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning |
US9191522B1 (en) | 2013-11-08 | 2015-11-17 | Sprint Communications Company L.P. | Billing varied service based on tier |
US9161325B1 (en) | 2013-11-20 | 2015-10-13 | Sprint Communications Company L.P. | Subscriber identity module virtualization |
US9118655B1 (en) | 2014-01-24 | 2015-08-25 | Sprint Communications Company L.P. | Trusted display and transmission of digital ticket documentation |
US9454787B1 (en) * | 2014-03-04 | 2016-09-27 | Stephen M. Dorr | Secure membership data sharing system and associated methods |
US9226145B1 (en) | 2014-03-28 | 2015-12-29 | Sprint Communications Company L.P. | Verification of mobile device integrity during activation |
US9230085B1 (en) | 2014-07-29 | 2016-01-05 | Sprint Communications Company L.P. | Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services |
US10826900B1 (en) * | 2014-12-31 | 2020-11-03 | Morphotrust Usa, Llc | Machine-readable verification of digital identifications |
US9779232B1 (en) | 2015-01-14 | 2017-10-03 | Sprint Communications Company L.P. | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data |
US9838868B1 (en) | 2015-01-26 | 2017-12-05 | Sprint Communications Company L.P. | Mated universal serial bus (USB) wireless dongles configured with destination addresses |
US9473945B1 (en) | 2015-04-07 | 2016-10-18 | Sprint Communications Company L.P. | Infrastructure for secure short message transmission |
US9819679B1 (en) | 2015-09-14 | 2017-11-14 | Sprint Communications Company L.P. | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers |
CN105162668B (en) * | 2015-09-17 | 2018-09-18 | 小米科技有限责任公司 | Connect method and device for removing |
US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
US9817992B1 (en) | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
EP3803651A4 (en) | 2018-06-06 | 2022-03-16 | JPMorgan Chase Bank, N.A. | Secure digital safe deposit boxes and methods of use |
US20200211099A1 (en) * | 2018-12-31 | 2020-07-02 | Finicity Corporation | Decentralized Customer-Controlled Credit Verification |
FR3094441B1 (en) | 2019-03-25 | 2021-04-09 | Vernet | Thermostatic cartridge |
US11062403B2 (en) | 2019-09-23 | 2021-07-13 | Arthur Ray Kerr | System and method for customizable link between two entities |
CN113127814B (en) * | 2019-12-31 | 2023-03-14 | 杭州海康威视数字技术股份有限公司 | Software anti-copying method and device, electronic equipment and readable storage medium |
CN111724166A (en) * | 2020-06-10 | 2020-09-29 | 苏州仙峰网络科技股份有限公司 | Payment method based on network game virtual property |
WO2022197297A1 (en) * | 2021-03-17 | 2022-09-22 | Zeku, Inc. | Apparatus and method of user privacy protection using machine learning |
US12120518B2 (en) * | 2021-12-22 | 2024-10-15 | T-Mobile Innovations Llc | Cryptographic identification of false base stations |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002056161A2 (en) * | 2001-01-11 | 2002-07-18 | Igor Hansen | System of databases of personal data and a method of governing access to databases of personal data |
US20030070101A1 (en) * | 2001-10-09 | 2003-04-10 | Buscemi James S. | Method and apparatus for protecting personal information and for verifying identities |
US20050027672A1 (en) * | 2003-07-31 | 2005-02-03 | Arndt Jeffrey A. | Personal Internet identity verification system |
US20060034494A1 (en) * | 2004-08-11 | 2006-02-16 | National Background Data, Llc | Personal identity data management |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060004588A1 (en) * | 2004-06-30 | 2006-01-05 | Mohan Ananda | Method and system for obtaining, maintaining and distributing data |
WO2007106851A2 (en) * | 2006-03-14 | 2007-09-20 | Document Atm Incorporated | Distributed access to valuable and sensitive documents and data |
-
2006
- 2006-06-13 AU AU2006202519A patent/AU2006202519A1/en not_active Abandoned
-
2007
- 2007-05-31 WO PCT/AU2007/000770 patent/WO2007137368A1/en active Application Filing
- 2007-05-31 GB GB0821883A patent/GB2452879A/en not_active Withdrawn
- 2007-05-31 AU AU2007266259A patent/AU2007266259A1/en not_active Abandoned
- 2007-05-31 US US12/302,911 patent/US20090271321A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002056161A2 (en) * | 2001-01-11 | 2002-07-18 | Igor Hansen | System of databases of personal data and a method of governing access to databases of personal data |
US20030070101A1 (en) * | 2001-10-09 | 2003-04-10 | Buscemi James S. | Method and apparatus for protecting personal information and for verifying identities |
US20050027672A1 (en) * | 2003-07-31 | 2005-02-03 | Arndt Jeffrey A. | Personal Internet identity verification system |
US20060034494A1 (en) * | 2004-08-11 | 2006-02-16 | National Background Data, Llc | Personal identity data management |
Also Published As
Publication number | Publication date |
---|---|
US20090271321A1 (en) | 2009-10-29 |
AU2006202519A1 (en) | 2006-07-27 |
WO2007137368A1 (en) | 2007-12-06 |
GB0821883D0 (en) | 2009-01-07 |
AU2007266259A1 (en) | 2007-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2452879A (en) | Method and system for verification of personnal imformation | |
WO2005036814A8 (en) | Image data verification | |
WO2004086189A3 (en) | Credit data collection method and apparatus | |
WO2004088472A3 (en) | Methods and systems for assessing and advising on electronic compliance | |
EP2045750A3 (en) | Methods and systems for creating and updating approved-file and trusted-domain databases | |
CA2569355C (en) | System and method for handling permits for user authentication tokens | |
TW200731155A (en) | Authenticity verification | |
WO2008091372A3 (en) | Geospatial modeling system providing non-linear inpainting for voids in geospatial model terrain data and related methods | |
WO2009089471A3 (en) | System and method for financial transaction validation | |
EP1265182A3 (en) | Validation system | |
WO2008085241A3 (en) | Method and system for payment authentication | |
MX2009001592A (en) | Compliance assessment reporting service. | |
GB2468261A (en) | Enhanced note processing | |
TW200512592A (en) | Image file container | |
NZ586279A (en) | System and method for securing data distributed by a first user to at least one recipient user | |
MY147064A (en) | Audio metadata verification | |
WO2008045667A3 (en) | Verification and authentication systems and methods | |
TW200611125A (en) | Information processor, information recording medium, content management system, and data processing method, and computer program | |
EG24332A (en) | System and method for generating collison-free identifiers for financial transaction cards | |
MX2008000629A (en) | Identity verification switch. | |
CN106650495A (en) | File verification method and device | |
DE60207289D1 (en) | METHOD AND DEVICE FOR SYMMETRIC KEY GENERATION IN A PERSONAL SAFETY DEVICE WITH LIMITED TRUST RELATIONSHIPS | |
WO2007038599A3 (en) | Online data verification of listing data | |
WO2009155146A3 (en) | Digitally signing documents using identity context information | |
WO2004111852A3 (en) | Managing a relationship between one target volume and one source volume |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |